Research Directions in Data and Applications Security: IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28–31, 2002, Cambridge, UK
Research Directions in Data and Applications Security describes original research results and innovative practical developments, all focused on maintaining security and privacy in database systems and applications that pervade cyberspace. The areas of coverage include: -Role-Based Access Control; -D...
Gespeichert in:
Weitere beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
New York, NY
Springer US
2003
|
Ausgabe: | 1st ed. 2003 |
Schriftenreihe: | IFIP Advances in Information and Communication Technology
128 |
Schlagwörter: | |
Links: | https://doi.org/10.1007/978-0-387-35697-6 https://doi.org/10.1007/978-0-387-35697-6 |
Zusammenfassung: | Research Directions in Data and Applications Security describes original research results and innovative practical developments, all focused on maintaining security and privacy in database systems and applications that pervade cyberspace. The areas of coverage include: -Role-Based Access Control; -Database Security; -XML Security; -Data Mining and Inference; -Multimedia System Security; -Network Security; -Public Key Infrastructure; -Formal Methods and Protocols; -Security and Privacy |
Umfang: | 1 Online-Ressource (XXII, 350 p) |
ISBN: | 9780387356976 |
DOI: | 10.1007/978-0-387-35697-6 |
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV047064180 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 201216s2003 xx o|||| 00||| eng d | ||
020 | |a 9780387356976 |9 978-0-387-35697-6 | ||
024 | 7 | |a 10.1007/978-0-387-35697-6 |2 doi | |
035 | |a (ZDB-2-SCS)978-0-387-35697-6 | ||
035 | |a (OCoLC)1227477111 | ||
035 | |a (DE-599)BVBBV047064180 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
082 | 0 | |a 004.0151 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
245 | 1 | 0 | |a Research Directions in Data and Applications Security |b IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28–31, 2002, Cambridge, UK |c edited by Ehud Gudes, Sujeet Shenoi |
250 | |a 1st ed. 2003 | ||
264 | 1 | |a New York, NY |b Springer US |c 2003 | |
300 | |a 1 Online-Ressource (XXII, 350 p) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a IFIP Advances in Information and Communication Technology |v 128 | |
520 | |a Research Directions in Data and Applications Security describes original research results and innovative practical developments, all focused on maintaining security and privacy in database systems and applications that pervade cyberspace. The areas of coverage include: -Role-Based Access Control; -Database Security; -XML Security; -Data Mining and Inference; -Multimedia System Security; -Network Security; -Public Key Infrastructure; -Formal Methods and Protocols; -Security and Privacy | ||
650 | 4 | |a Theory of Computation | |
650 | 4 | |a Data Structures and Information Theory | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Information Storage and Retrieval | |
650 | 4 | |a Computers | |
650 | 4 | |a Data structures (Computer science) | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Information storage and retrieval | |
700 | 1 | |a Gudes, Ehud |4 edt | |
700 | 1 | |a Shenoi, Sujeet |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781475764130 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781402075414 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781475764123 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-0-387-35697-6 |x Verlag |z URL des Eerstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2000/2004 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-032471292 | |
966 | e | |u https://doi.org/10.1007/978-0-387-35697-6 |l DE-706 |p ZDB-2-SCS |q ZDB-2-SCS_2000/2004 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1818987566686273536 |
---|---|
any_adam_object | |
author2 | Gudes, Ehud Shenoi, Sujeet |
author2_role | edt edt |
author2_variant | e g eg s s ss |
author_facet | Gudes, Ehud Shenoi, Sujeet |
building | Verbundindex |
bvnumber | BV047064180 |
classification_rvk | ST 276 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)978-0-387-35697-6 (OCoLC)1227477111 (DE-599)BVBBV047064180 |
dewey-full | 004.0151 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.0151 |
dewey-search | 004.0151 |
dewey-sort | 14.0151 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-0-387-35697-6 |
edition | 1st ed. 2003 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02536nam a2200529zcb4500</leader><controlfield tag="001">BV047064180</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201216s2003 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780387356976</subfield><subfield code="9">978-0-387-35697-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-0-387-35697-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-0-387-35697-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1227477111</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047064180</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.0151</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Research Directions in Data and Applications Security</subfield><subfield code="b">IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28–31, 2002, Cambridge, UK</subfield><subfield code="c">edited by Ehud Gudes, Sujeet Shenoi</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2003</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer US</subfield><subfield code="c">2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XXII, 350 p)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">IFIP Advances in Information and Communication Technology</subfield><subfield code="v">128</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Research Directions in Data and Applications Security describes original research results and innovative practical developments, all focused on maintaining security and privacy in database systems and applications that pervade cyberspace. The areas of coverage include: -Role-Based Access Control; -Database Security; -XML Security; -Data Mining and Inference; -Multimedia System Security; -Network Security; -Public Key Infrastructure; -Formal Methods and Protocols; -Security and Privacy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Theory of Computation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Structures and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Storage and Retrieval</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information storage and retrieval</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gudes, Ehud</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shenoi, Sujeet</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781475764130</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781402075414</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781475764123</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-0-387-35697-6</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Eerstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2000/2004</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032471292</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-0-387-35697-6</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="q">ZDB-2-SCS_2000/2004</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047064180 |
illustrated | Not Illustrated |
indexdate | 2024-12-20T19:08:44Z |
institution | BVB |
isbn | 9780387356976 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032471292 |
oclc_num | 1227477111 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 Online-Ressource (XXII, 350 p) |
psigel | ZDB-2-SCS ZDB-2-SCS_2000/2004 ZDB-2-SCS ZDB-2-SCS_2000/2004 |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Springer US |
record_format | marc |
series2 | IFIP Advances in Information and Communication Technology |
spelling | Research Directions in Data and Applications Security IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28–31, 2002, Cambridge, UK edited by Ehud Gudes, Sujeet Shenoi 1st ed. 2003 New York, NY Springer US 2003 1 Online-Ressource (XXII, 350 p) txt rdacontent c rdamedia cr rdacarrier IFIP Advances in Information and Communication Technology 128 Research Directions in Data and Applications Security describes original research results and innovative practical developments, all focused on maintaining security and privacy in database systems and applications that pervade cyberspace. The areas of coverage include: -Role-Based Access Control; -Database Security; -XML Security; -Data Mining and Inference; -Multimedia System Security; -Network Security; -Public Key Infrastructure; -Formal Methods and Protocols; -Security and Privacy Theory of Computation Data Structures and Information Theory Computer Communication Networks Information Storage and Retrieval Computers Data structures (Computer science) Computer communication systems Information storage and retrieval Gudes, Ehud edt Shenoi, Sujeet edt Erscheint auch als Druck-Ausgabe 9781475764130 Erscheint auch als Druck-Ausgabe 9781402075414 Erscheint auch als Druck-Ausgabe 9781475764123 https://doi.org/10.1007/978-0-387-35697-6 Verlag URL des Eerstveröffentlichers Volltext |
spellingShingle | Research Directions in Data and Applications Security IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28–31, 2002, Cambridge, UK Theory of Computation Data Structures and Information Theory Computer Communication Networks Information Storage and Retrieval Computers Data structures (Computer science) Computer communication systems Information storage and retrieval |
title | Research Directions in Data and Applications Security IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28–31, 2002, Cambridge, UK |
title_auth | Research Directions in Data and Applications Security IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28–31, 2002, Cambridge, UK |
title_exact_search | Research Directions in Data and Applications Security IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28–31, 2002, Cambridge, UK |
title_full | Research Directions in Data and Applications Security IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28–31, 2002, Cambridge, UK edited by Ehud Gudes, Sujeet Shenoi |
title_fullStr | Research Directions in Data and Applications Security IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28–31, 2002, Cambridge, UK edited by Ehud Gudes, Sujeet Shenoi |
title_full_unstemmed | Research Directions in Data and Applications Security IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28–31, 2002, Cambridge, UK edited by Ehud Gudes, Sujeet Shenoi |
title_short | Research Directions in Data and Applications Security |
title_sort | research directions in data and applications security ifip tc11 wg11 3 sixteenth annual conference on data and applications security july 28 31 2002 cambridge uk |
title_sub | IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28–31, 2002, Cambridge, UK |
topic | Theory of Computation Data Structures and Information Theory Computer Communication Networks Information Storage and Retrieval Computers Data structures (Computer science) Computer communication systems Information storage and retrieval |
topic_facet | Theory of Computation Data Structures and Information Theory Computer Communication Networks Information Storage and Retrieval Computers Data structures (Computer science) Computer communication systems Information storage and retrieval |
url | https://doi.org/10.1007/978-0-387-35697-6 |
work_keys_str_mv | AT gudesehud researchdirectionsindataandapplicationssecurityifiptc11wg113sixteenthannualconferenceondataandapplicationssecurityjuly28312002cambridgeuk AT shenoisujeet researchdirectionsindataandapplicationssecurityifiptc11wg113sixteenthannualconferenceondataandapplicationssecurityjuly28312002cambridgeuk |